{"title":"利用基于风险的改进网格加密技术进行移动节点验证,实现自适应多因素验证,确保数据传输安全","authors":"Qureshi Imran M Hussain, Vijay Kale","doi":"10.1016/j.compeleceng.2025.110272","DOIUrl":null,"url":null,"abstract":"<div><div>With the rapid proliferation of mobile services, the strategies for protecting the availability, confidentiality, and integrity of systems emerged to meet the demands of mobile networks. More specifically, the insecure mobile networks are more prone to different attacks and interrupt secure data communications between legitimate users. Despite the intensive research, the design of a secure and efficient multi-factor authentication scheme is still a challenging problem that ends with poor security, poor session management, and vulnerability to new and enhanced attacks. In order to tackle the challenges in the existing techniques, Risk-based modified lattice cryptography-enabled adaptive multifactor authentication (R-mLC-AMf) is proposed in the research. The ultimate intention of the research lies in the authentication of mobile nodes specifically in case of handover, or even reconfiguration with the same network that happens due to the risk factors. The proposed authentication in the research is performed with the AMf mechanism that authenticates the user with the help of multi-factors that evolve dynamically based on environmental factors. Specifically, the application of modified lattice cryptography into the research model works in encrypting the data and improves the security against attacks, addresses the scalability issues, and provides high computation efficiency. Further, the incorporation of Delegated Proof of Stake (DPoS) in the smart contract of blockchain addresses effective security purposes and offers the benefits of high transaction volume, low cost, faster confirmation time, and high efficiency. The Simulation results demonstrate that the proposed mechanism is effective even in the presence of malicious attacks in the network.Finally, the performance evaluation demonstrates that the proposed approach is efficient in terms of decryption time, encryption time, Genuine User Rate (GUR), memory, responsiveness, and time complexity that attained 1.091 ms, 0.895 ms, 0.87, 131.256 KB, 0.343 ms, and 0.497 ms respectively outperforming the other state-of-the-art approaches.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110272"},"PeriodicalIF":4.0000,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Mobile node authentication with risk-based modified lattice cryptography enabled adaptive multifactor authentication for secure data transmission\",\"authors\":\"Qureshi Imran M Hussain, Vijay Kale\",\"doi\":\"10.1016/j.compeleceng.2025.110272\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>With the rapid proliferation of mobile services, the strategies for protecting the availability, confidentiality, and integrity of systems emerged to meet the demands of mobile networks. More specifically, the insecure mobile networks are more prone to different attacks and interrupt secure data communications between legitimate users. Despite the intensive research, the design of a secure and efficient multi-factor authentication scheme is still a challenging problem that ends with poor security, poor session management, and vulnerability to new and enhanced attacks. In order to tackle the challenges in the existing techniques, Risk-based modified lattice cryptography-enabled adaptive multifactor authentication (R-mLC-AMf) is proposed in the research. The ultimate intention of the research lies in the authentication of mobile nodes specifically in case of handover, or even reconfiguration with the same network that happens due to the risk factors. The proposed authentication in the research is performed with the AMf mechanism that authenticates the user with the help of multi-factors that evolve dynamically based on environmental factors. Specifically, the application of modified lattice cryptography into the research model works in encrypting the data and improves the security against attacks, addresses the scalability issues, and provides high computation efficiency. Further, the incorporation of Delegated Proof of Stake (DPoS) in the smart contract of blockchain addresses effective security purposes and offers the benefits of high transaction volume, low cost, faster confirmation time, and high efficiency. The Simulation results demonstrate that the proposed mechanism is effective even in the presence of malicious attacks in the network.Finally, the performance evaluation demonstrates that the proposed approach is efficient in terms of decryption time, encryption time, Genuine User Rate (GUR), memory, responsiveness, and time complexity that attained 1.091 ms, 0.895 ms, 0.87, 131.256 KB, 0.343 ms, and 0.497 ms respectively outperforming the other state-of-the-art approaches.</div></div>\",\"PeriodicalId\":50630,\"journal\":{\"name\":\"Computers & Electrical Engineering\",\"volume\":\"124 \",\"pages\":\"Article 110272\"},\"PeriodicalIF\":4.0000,\"publicationDate\":\"2025-04-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Electrical Engineering\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0045790625002150\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625002150","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Mobile node authentication with risk-based modified lattice cryptography enabled adaptive multifactor authentication for secure data transmission
With the rapid proliferation of mobile services, the strategies for protecting the availability, confidentiality, and integrity of systems emerged to meet the demands of mobile networks. More specifically, the insecure mobile networks are more prone to different attacks and interrupt secure data communications between legitimate users. Despite the intensive research, the design of a secure and efficient multi-factor authentication scheme is still a challenging problem that ends with poor security, poor session management, and vulnerability to new and enhanced attacks. In order to tackle the challenges in the existing techniques, Risk-based modified lattice cryptography-enabled adaptive multifactor authentication (R-mLC-AMf) is proposed in the research. The ultimate intention of the research lies in the authentication of mobile nodes specifically in case of handover, or even reconfiguration with the same network that happens due to the risk factors. The proposed authentication in the research is performed with the AMf mechanism that authenticates the user with the help of multi-factors that evolve dynamically based on environmental factors. Specifically, the application of modified lattice cryptography into the research model works in encrypting the data and improves the security against attacks, addresses the scalability issues, and provides high computation efficiency. Further, the incorporation of Delegated Proof of Stake (DPoS) in the smart contract of blockchain addresses effective security purposes and offers the benefits of high transaction volume, low cost, faster confirmation time, and high efficiency. The Simulation results demonstrate that the proposed mechanism is effective even in the presence of malicious attacks in the network.Finally, the performance evaluation demonstrates that the proposed approach is efficient in terms of decryption time, encryption time, Genuine User Rate (GUR), memory, responsiveness, and time complexity that attained 1.091 ms, 0.895 ms, 0.87, 131.256 KB, 0.343 ms, and 0.497 ms respectively outperforming the other state-of-the-art approaches.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.